An Approach to Detect and Correct Single Bit Data Error Using Reed_Muller Matrix

Size: px
Start display at page:

Download "An Approach to Detect and Correct Single Bit Data Error Using Reed_Muller Matrix"

Transcription

1 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May An Approach to Detect and Correct Single Bit Data Error Using Reed_Muller Matrix Monika Gope, Md. Ariful Islam Khandaker, Mehnuma Tabassum Omar Department of Computer Science and Engineering Khulna University of Engineering & Technology (KUET) Khulna 9203, Bangladesh. Abstract: Transferring data between two points is very crucial, also for some vital applications the precision of the transferred data is extremely important, however an error throughout the transmission of data is awfully familiar [1]. Error correcting codes are very valuable in transfer information over lengthy distances or through channels where errors might take place in the message. They have become more common as telecommunications have expanded and developed a use for codes that can auto-correct. Reed Muller codes are a family of linear error correcting codes used in communications [2].For bit error correction, the Reed-Muller code is one of the efficient algorithms, on the other hand, its high-computation prerequisite innate in the decoding process interdict its use in handy applications [3].This paper describes a new method to detect and correct a single bit in the data message using Reed Muller matrix. The aim is to provide error-free information through transmitting and receiving by detection and correction a single bit in a big data very efficiently. The design detects and corrects all single bit errors in a 16, 32, 64, 128 bit data, and used 4, 5, 6, 7 check bits respectively. In the proposed method, it is feasible to detect the precise place of single bit error and correct that using least. Index Terms- Error Correction and detection, Reed Muller, Coding, Single bit error, Check bit I I. INTRODUCTION n the present world, communication has got numerous applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end [4]. Through data transmission, the arbitrary bit errors can be formed by ecological obstruction and material defects in the communication medium. Error coding is a technique of detecting and correcting these errors to make sure data is transferred unbroken from its source to its target. Computing in computer memory, magnetic and optical data storage technology, satellite, space and network communications, mobile networks, and almost any other form of digital data communication the error coding is used for fault tolerant. For communication error coding uses arithmetical formulas to encode data bits at the source into longer bit words and at the destination it decode the received bit words with the decoding method and determine the original massage. The earlier approach uses Error-Correcting Codes and latter uses Error-detecting Codes [5]. A method is basically worthless if it does not assure that the data received by one device are the same as the data transmitted by a different device. The main objective of this study is to device a coding scheme which is able to detect and correct such errors [6]. The rest of the paper is prepared as follows. In section 2, we briefly describe the highlights of the background of the coding scheme used in this paper. Section 3 presents our algorithm for matrix generation and generation, for all 16 bit,32 bit, 64 bit, 128 bit (and so on) data with check bit respectively 4, 5 6 ( and so on). In section 4, we present our algorithms for error correction and detection, validating the mathematical model used in Section 3 for mitigating soft error. In section 5, we will analysis our results and showed relative efficiency of the other ECC schemes. Section 6 concludes the paper. II. BACK GROUND OF THE CODING SCHEME The technique for error detection and correction algorithms presented in this paper had been implemented by Reed-Muller matrix, which is used mostly to convert between Fixed Polarity Reed-Muller form and Boolean functions [8, 9]. The process is mainly divided into two parts. The algorithm which is relatively simple involves transmitting data with multiple and decoding the associated when receiving or when reading data from random access memory (RAM) to detect the errors [6]. By combing the exact data bits in the original message using XOR operator each are generated. So at first we have generated the Reed-Muller matrix and then from the matrix we have to find out the check bit. The minimum number of check bits required to detect a single bit in the message is given by the following equation: D+C+1 2r (1) Where D is the number of data bits and C is the number of. Reed-Muller (RM) Codes are a family of linear errorcorrecting codes used in communications and are one of the oldest error correcting codes. On the other hand, error correcting codes play a significant function in computational complexity theory and are very functional in sending information over extensive distances in which errors might take place in the message [7]. This section describes a theory for encoding the message the transmitted data by using Reed-Muller basic matrix [10, 11]. In order to generate the Reed-Muller matrix for

2 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May all 16 bit, 32 bit, 64 and 128 bit data, the following Reed-Muller matrix is used: To generate we need to find out the corresponding 1 in the matrix and then XOR with them which will reflects the nature of the error. III. ALGORITHM FOR MATRIX AND CHECK BIT GENERATION To explain the concepts involved we developed a code that can detect and correct single bit error in 16, 32, 64, 128 bit words. We used equation (2) as a basic matrix for 16, 32, 64, 128 bit data. We used the equation for determining the data bit, (2) 2 C = D (3) Where C is the positive integer number which means how many times we need use the Kronecker operation [10, 11] over Reed-Muller matrix or how many is required to detect and correct error and D is data bit. Here as an example we will explain the 32 bit Reed-Muller matrix. To generate 32 bit Reed- Muller matrix we need Kronecker operator * for five times. Here, in this explanation C = 5 which means the data bit D = 32 as 2 5 = 32 for 5 times Kronecker operation over Reed-Muller matrix. (4) 3. If COUNT%R= =0 and COUNT!=0 Then: Set M: = M+1 4. If I % 2= = 0 then: Set P :=0 Else Set P: =1 5. Set L:=0 6. Repeat Steps 7 to 9 for J = 0,1,.Q-1 7. Set K:=0 8. Repeat while K < 2: a) Set X3[I][J+K] := X1[M][L] * X2[P][K] b) Set COUNT := COUNT + 1 [End Loop of Step 8] 9. Set L := L Return Algorithm (Reed_Muller): X1, X2 and X3 are two dimensional global declared matrixes and initially X1 is a basic 2x2 matrix. Finally X3 contains n x n output matrix. 1. [Initialization] Set S :=4, Q :=4 and R : =8 2. Repeat Steps 3 and 4 for I =1, 2,..n-1 3. Call Reed_Muller ( S, Q, R) 4. Set S := S * 2, Q := Q * 2 and R : = R * 2 5. Exit To generate the from equation (3), each row in equation (3) is operated on the data bits using the XOR and the AND operations to produce the necessary that are needed in the system to detect the error in the received message or the written message. The final results are given below, where + are XOR operation. The Algorithm we used for Reed-Muller matrix generation is given below: Procedure: Reed_Muller (S, Q, R) 1. [Initialization] Set COUNT := 0 and M :=0 2. Repeat Steps 3 to 9 for I = 0,1,.S-1 =D 0 C 1 =D 0 + D 1 C 2 =D 0 + D 2 C 3 =D 0 + D 1 + D 2 + D 3 C 4 =D 0 + D 4 C 5 =D 0 + D 1 + D 4 + D 5 C 6 =D 0 + D 2 + D 4 + D 6 C 7 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 C 8 =D 0 +D 8 C 9 =D 0 + D 1 +D 8 +D 9 C 10 =D 0 + D 2 + D 8 +D 10 C 11 =D 0 +D 1 +D 2 +D 3 + D 8 +D 9 +D 10 +D 11 C 12 =D 0 + D 4 + D8+ D 12 C 13 =D 0 +D 1 + D 4 +D 5 + D 8 +D 9 +D 12 +D 13 C 14 =D 0 +D 2 +D 4 +D 6 +D 8 +D 10 +D 12 +D 14 C 15 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 8 +D+D 10 +D 11 +D 12 +D 1 3 +D 14 +D 15 C 16 =D 0 + D 16 C 17 =D 0 + D 16 C 18 =D 0 + D 2 + D 16 + D 18 C 19 =D 0 + D 1 + D 2 + D 3 + D 16 + D 17 + D 18 +D 19 C 20 =D 0 + D 4 + D 16 + D 20 C 21 =D 0 + D 1 + D 4 + D 5 + D 16 + D 17 + D 20 + D 21

3 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May C 22 =D 0 + D 2 + D 4 + D 6 + D 16 + D 18 + D 20 + D 22 C 23 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 16 +D 17 +D 18 +D 19 +D 20 + D 21 +D 22 +D 23 C 24 =D 0 +D 8 +D 16 +D 24 C 25 =D 0 + D 1 +D 8 +D 9 + D 16 + D 17 + D 24 +D 25 C 26 =D 0 + D 2 + D 8 +D 10 + D 16 + D 18 +D 24 +D 26 C 27 =D 0 +D 1 +D 2 +D 3 +D 8 +D 9 +D 10 +D 11 +D 16 +D 17 +D 18 D 19 +D 24 +D 25 +D 26 +D 27 C 28 =D 0 + D 4 + D 8 + D 12 + D 16 + D 20 + D 24 + D 28 C 29 =D 0 +D 1 +D 4 +D 5 +D 8 +D 9 +D 12 +D 13 +D 16 +D 17 +D 20 +D 21 +D 24 +D 25 +D 28 +D 29 C 30 =D 0 +D 2 +D 4 +D 6 +D 8 +D 10 +D 12 +D 14 +D 16 +D 18 +D 20 +D 22 +D 2 4+ D 26 +D 28 +D 30 C 31 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 8 +D 9 +D 10 +D 11 +D 12 +D 13+ D 14 +D 15 +D 16 +D 17 +D 18 +D 19 +D 20 +D 21 +D 22 +D 23 +D 24 +D 25 +D 26 + D 27 +D 28 +D 29 +D 30 +D 31 Now we need to calculate the from the C0 to C31. As in this example we are working with 32 bit data, from equation (3), we find there are five. This five check bits are calculated from the following equation Q = 2 C-1 (5) Where Q means how many 1 s are in every check bit as the sum of 1 one column in the matrix and C = No. of Check bit, C. Those we have Q number of 1 in their column they are selected as check bit. So therefore, here C = 5 and Q = 16 which means from to C 31 who has 16 one, they should be selected as check bit. From the equation (3) and (5) we can derive the five check bit set which are as follows. C 15 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 8 +D+ D 10 +D 11 +D 12 +D 13 +D 14 +D 15 C 23 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 + D 16 +D 17 +D 18 +D 19 +D 20 +D 21 +D 22 +D 23 C 27 =D 0 +D 1 +D 2 +D 3 +D 8 +D 9 +D 10 +D 11 +D 16 + D 17 + D 18 D 19 +D 24 +D 25 +D 26 +D 27 C 29 =D 0 +D 1 +D 4 +D 5 +D 8 +D 9 +D 12 +D 13 +D 16 + D 17 +D 20 +D 21 +D 24 +D 25 +D 28 +D 29 C 30 =D 0 +D 2 +D 4 +D 6 +D 8 +D 10 +D 12 +D 14 +D 16 + D 18 +D 20 +D 22 +D 24 +D 26 +D 28 +D 30 Now, we will denote C 15, C 23, C 27, C29 and C 30 respectively to, C 1, C 2, C 3 and C 4. From equation (3) for 64 data bit, the no of check bit is 6 as 64 = 2 6 and from the equation (5) the check bit set are as follows as each of the following contains 32 one in each column, C 31, C 47, C 55, C 59, C 61 and C 62. Table 1: The Corresponding for 32 data bit, D 0 to D 31 Data bits Generated check bit C 1 C 2 C 3 C 4 D 0 D 1 D 2 D 3 D 4 D 5 D 6 D 7 D 8 D 9 D 10 D 11 D 12 D 13 D 14 D 15 D 16 D 17 D 18 D 19 D 20 D 21 D 22 D 23 D 24 D 25 D 26 D 27 D 28 D 29 D 30 D 31 IV. ALGORITHM FOR ERROR CORRECTION AND DETECTION: Here we present the two algorithms for research of this paper for Error detection and correction for single data bit error. Algorithm EDC: Error Detection for data bit error () { 1. Calculation of the Syndrome Code, Syndrome Code = Received Check bit XOR Receiver generated Received Check bit. 2. IF Syndrome Code contains only zero, then there is no Error detected in Received Check bit. Do nothing or Print NO Error. 3. IF Syndrome Code contains multiple one but not all one, Then Error detected in one of the Received Data bit. Print Error in Data bit. 4. IF Syndrome Code contains all one, Then Error detected in the first Received Data bit. Print Error D 0 Data bit. }

4 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May Algorithm ECC: Error Correction for data bit error () { 1. IF Error detected in the first Received Data bit, then inverse the first Received Data bit. 2. IF Error detected in one of the Received Data bit, then the sum or weight of numerical value of the data bit is calculated by identified the zero-bits in the syndrome starting from the second bit left to right. These numerical values are zero and power of 2 as 2 N where N = 0, 1, 2, 3...to C, C = No. of check bit. 3. After identified the position of error in the Received Data bit from 2, the data bit position is inversed. } V. IMPLEMENTATION AND RESULT ANALYSIS: In paper [6], they proposed the error correction and detection code for 16 data bit with 6. Here, in our research, we showed the method which will work on 16, 32, 64 and 128 data bits and the required respectively 4, 5, 6 and 7 which will reduce the memory cost magnificently. Our unique contribution of the paper is the equation (3) and (4) which we proposed here to identified the. Table 2: Identifying the 2 C Data Bits, D Check bit, C C contains 2 C-1 s 1(one) in each Colum In our Error Correction Code Algorithms which we proposed here is very faster than [6], as we introduced power of 2 to identify the error position where one of the Received Data bits are error. From the algorithm we have simulated the error in data bit in our own simulator and find the result for 32 bit data, which is given in Table 3. Table 3 summarizes the process if one of the data bit become corrupted. Here the data massage = and check bit = We get the Syndrome by the following equation: Syndrome = Received + Recalculated/Receiver Generated Check bits (6) Where + means XOR operation and we got recalculated from equation (5). Table 3: Syndrome with recalculated and error bit position of the error data Data Received Recalculated Syndrome Error bit position of data D D D D =3 D D =5 D D = 17 D = 18 D = 19 D = 20 D =27 D = 28 D =29 D =30 D = 31 To find the error in one of the, the following Table 4 is used: Check bit Table 4: Syndrome for error check bit Received Recalculated Syndrome Error bit position of check bit C C C C VI. CONCLUSION In this paper we simply introduced a simple algorithm, which can be used to detect, and correct the errors in the transmitted data and check bit separately based on Reed-Muller matrix. The algorithm was tested on single bit error in our designed simulator and has found correct results for 16, 32, 64 and 128 data bits. In Future the algorithm can be extended to find more than single bit error.

5 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May REFERENCES [1] Pramod S P, Rajagopal A, Akshay S Kotain, FPGA Implementation of Single Bit Error Correction using CRC, International Journal of Computer Applications ( ) Volume 52 No.10, August 2012 [2] [2] Nidhi Syal, Vaneet Chahal, Comparison of reed_muller and hamming codes for error detection and correction, ISP Journal of Electronics Engineering, Vol1, Issue 1, October 2011, (5-9) [3] Md. Sharif Uddin, Cheol Hong Kim, Jong-MyonKim, Accelerating Soft- Decision Reed-Muller Decoding Using a Graphics Processing Unit, Asiapacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology Vol.4, No.2, December (2014), pp [4] Varsha P. Patil, Prof. D. G. Chougule, Radhika.R.Naik, Viterbi Algorithm for error detection and correction, IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: , ISBN: , PP: [5] Notes on Error Detection and Correction, Version 2 CSE IIT, Kharagpur [6] Khalid Faraj, Design Error Detection and Correction System based on Reed_Muller Matrix for Memory Protection, International Journal of Computer Applications ( ) Volume 34 No.8, November 2011 [7] Othman O. Khalifa, Aisha-Huassan Abdullah, N. Suriyana, Saidah Zawanah and Shihab A. Hameed Reed-Muller Codec Simulation Performance, Journal of Computer Science 4 (10): , 2008 ISSN [8] Reed, I. S., Class of multiple error correcting codes and their decoding scheme, Institute of Radio Engineers Transaction on Information Theory, PGIT-4: pp , [9] Muller, D. E., Application of Boolean algebra to switching circuit design and to error detection, Institute of Radio Engineers Transaction on Electronic Computers, EC-3: pp. 6-12, September [10] Faraj, K., Almaini, A.E.A., Minimization of Dual Reed-Muller Forms using Dual Property WSEAS TRANSACTIONS on CIRCUITS and SYSTEMS, Issue 1, Vol. 6, pp.9-15, January [11] Faraj, K., Almaini, A.E.A., Optimal Expression for Fixed Polarity Dual Reed-Muller Forms, WSEAS TRANSACTIONS on CIRCUITS and SYSTEMS, Issue 3, Vol. 6, pp.9-15, March AUTHORS First Author Monika Gope, M.Sc (CSE ongoing), Khulna University of Engineering & Technology, gopenath14@yahoo.com. Second Author Md. Ariful Islam Khandaker, M.Sc(CSE ongoing), Khulna University of Engineering & Technology,aikhandaker@yahoo.com. Third Author Mehnuma Tabassum Omar, M.Sc(CSE ongoing), Khulna University of Engineering & Technology, misty2409@gmail.com.

Viterbi Algorithm for error detection and correction

Viterbi Algorithm for error detection and correction IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 60-65 www.iosrjournals.org Viterbi Algorithm for error detection and correction Varsha P. Patil

More information

Achieving Reliable Digital Data Communication through Mathematical Algebraic Coding Techniques

Achieving Reliable Digital Data Communication through Mathematical Algebraic Coding Techniques International Journal of Pure and Applied Mathematical Sciences. ISSN 0972-9828 Volume 9, Number 2 (2016), pp. 183-190 Research India Publications http://www.ripublication.com Achieving Reliable Digital

More information

Design and Implementation of Hamming Code on FPGA using Verilog

Design and Implementation of Hamming Code on FPGA using Verilog International Journal of Engineering and Advanced Technology (IJEAT) Design and Implementation of Hamming Code on FPGA using Verilog Ravi Hosamani, Ashwini S. Karne Abstract In mathematics, digital communication

More information

Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes P. Kalai Mani, V. Vishnu Prasath PG Student, Department of Applied Electronics, Sri Subramanya College of Engineering

More information

Hamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics

Hamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics Hamming Codes Hamming codes belong to the class of codes known as Linear Block Codes. We will discuss the generation of single error correction Hamming codes and give several mathematical descriptions

More information

Implementation of Fault Tolerant Parallel Filters Using ECC Technique

Implementation of Fault Tolerant Parallel Filters Using ECC Technique IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 6, Issue 4, Ver. II (Jul. - Aug. 2016), PP 19-25 e-issn: 2319 4200, p-issn No. : 2319 4197 www.iosrjournals.org Implementation of Fault Tolerant

More information

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors

More information

Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER) and Field-Programmable Gate Array (FPGA)

Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER) and Field-Programmable Gate Array (FPGA) IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.5, May 2016 21 Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER)

More information

J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India.

J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India. Design of Single Correction-Double -Triple -Tetra (Sec-Daed-Taed- Tetra Aed) Codes J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India. Dr. M. Manikandan Associate Professor,

More information

Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL

Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Ch.Srujana M.Tech [EDT] srujanaxc@gmail.com SR Engineering College, Warangal. M.Sampath Reddy Assoc. Professor, Department

More information

Error Correction Using Extended Orthogonal Latin Square Codes

Error Correction Using Extended Orthogonal Latin Square Codes International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 9, Number 1 (2016), pp. 55-62 International Research Publication House http://www.irphouse.com Error Correction

More information

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES (1) Nallaparaju Sneha, PG Scholar in VLSI Design, (2) Dr. K. Babulu, Professor, ECE Department, (1)(2)

More information

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes 1 U.Rahila Begum, 2 V. Padmajothi 1 PG Student, 2 Assistant Professor 1 Department Of

More information

Error Correction and Detection using Cyclic Redundancy Check

Error Correction and Detection using Cyclic Redundancy Check Error Correction and Detection using Cyclic Redundancy Check Dr. T. Logeswari Associate Professor, Dept of Computer Science, New Horizon College, Banglore, Karnataka, India ABSTRACT: In this paper Cyclic

More information

A New Error Correction Coding Approach

A New Error Correction Coding Approach 42 JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, VOL. 4, NO. 3, AUGUST 203 A New Error Correction Coding Approach Muhammad Sheikh Sadi Department of Computer Science & Engineering, Khulna University of

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The

More information

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

On-Line Error Detecting Constant Delay Adder

On-Line Error Detecting Constant Delay Adder On-Line Error Detecting Constant Delay Adder Whitney J. Townsend and Jacob A. Abraham Computer Engineering Research Center The University of Texas at Austin whitney and jaa @cerc.utexas.edu Parag K. Lala

More information

An HVD Based Error Detection and Correction Code in HDLC Protocol Used for Communication

An HVD Based Error Detection and Correction Code in HDLC Protocol Used for Communication An HVD Based Error Detection and Correction Code in HDLC Protocol Used for Communication Shubham Fadnavis, M. Tech. (Final Year) Department of Electronics & Communication, Acropolis Institute of Technology

More information

Implementation of Convolution Encoder and Viterbi Decoder Using Verilog

Implementation of Convolution Encoder and Viterbi Decoder Using Verilog International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 11, Number 1 (2018), pp. 13-21 International Research Publication House http://www.irphouse.com Implementation

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Error Resilience: A Distinct Approach for Comparative Analysis of Error Correcting Codes

Error Resilience: A Distinct Approach for Comparative Analysis of Error Correcting Codes I J C T A, 9(32), 2016, pp. 73-78 International Science Press ISSN: 0974-5572 Error Resilience: A Distinct Approach for Comparative Analysis of Error Correcting Codes P. Ratna Kamala* and R.V.S. Satyanarayana**

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

Design and Implementation of Low Density Parity Check Codes

Design and Implementation of Low Density Parity Check Codes IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V2 PP 21-25 www.iosrjen.org Design and Implementation of Low Density Parity Check Codes

More information

FPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes

FPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes FPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes E. Jebamalar Leavline Assistant Professor, Department of ECE, Anna University, BIT Campus, Tiruchirappalli, India Email: jebilee@gmail.com

More information

Design Single and Multiple Errors Correction Block Codes

Design Single and Multiple Errors Correction Block Codes Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)

More information

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Vishal Badole 1, Amit Udawat 2 Department of Electronics and Communication Engg. 1, Acropolis

More information

Implementation of Hamming code using VLSI

Implementation of Hamming code using VLSI International Journal of Engineering Trends and Technology- Volume4Issue2-23 Implementation of Hamming code using VLSI Nutan Shep, Mrs. P.H. Bhagat 2 Department of Electronics & Telecommunication Dr.B.A.M.U,Aurangabad

More information

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

AUDIO COMPRESSION USING WAVELET TRANSFORM

AUDIO COMPRESSION USING WAVELET TRANSFORM AUDIO COMPRESSION USING WAVELET TRANSFORM Swapnil T. Dumbre Department of electronics, Amrutvahini College of Engineering,Sangamner,India Sheetal S. Gundal Department of electronics, Amrutvahini College

More information

A High Performance CRC Checker for Ethernet Application

A High Performance CRC Checker for Ethernet Application A High Performance CRC Checker for Ethernet Application Deepti Rani Mahankuda & M. Suresh Electronics and Communication Engineering Dept. National Institute of Technology, Berhampur, Odisha, India. E-mail:deepti.rani07@gmail.com

More information

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images  Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images

More information

Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR)

Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR) Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR) P. Vincy Priscilla 1, R. Padmavathi 2, S. Tamilselvan 3, Dr.S. Kanthamani 4 1,4 Department

More information

DESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY

DESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY DESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY K.Maheshwari M.Tech VLSI, Aurora scientific technological and research academy, Bandlaguda, Hyderabad. k.sandeep kumar Asst.prof,

More information

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.

More information

Error Detection And Correction

Error Detection And Correction Announcements Please read Error Detection and Correction sent to you by your grader. Lab Assignment #2 deals with Hamming Code. Lab Assignment #2 is available now and will be due by 11:59 PM on March 22.

More information

Implementation of 16-Bit Hamming Code encoder and decoder for single bit error detector and corrector

Implementation of 16-Bit Hamming Code encoder and decoder for single bit error detector and corrector Implementation of 16-Bit Hamming Code encoder and decoder for single bit error detector and corrector Dr.K.S.Srikanth, Dept of EEE, GMR IT, Gmr Nagar, Rajam A.R.V.Siva Krishna, Dept of Systems Design,

More information

(Refer Slide Time 3:31)

(Refer Slide Time 3:31) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions

More information

Fault Tolerant Parallel Filters Based on ECC Codes

Fault Tolerant Parallel Filters Based on ECC Codes Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 11, Number 7 (2018) pp. 597-605 Research India Publications http://www.ripublication.com Fault Tolerant Parallel Filters Based on

More information

Application of Two-dimensional Periodic Cellular Automata in Image Processing

Application of Two-dimensional Periodic Cellular Automata in Image Processing International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN 255 CORRECTIONS TO FAULT SECURE OF MAJORITY LOGIC DECODER AND DETECTOR FOR MEMORY APPLICATIONS Viji.D PG Scholar Embedded Systems Prist University, Thanjuvr - India Mr.T.Sathees Kumar AP/ECE Prist University,

More information

Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure

Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure Iswarya Gopal, Rajasekar.T, PG Scholar, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India Assistant

More information

Design and Implementation of Low-Complexity Redundant Multiplier Architecture for Finite Field

Design and Implementation of Low-Complexity Redundant Multiplier Architecture for Finite Field Design and Implementation of Low-Complexity Redundant Multiplier Architecture for Finite Field Veerraju kaki Electronics and Communication Engineering, India Abstract- In the present work, a low-complexity

More information

VLSI Implementation of Daubechies Wavelet Filter for Image Compression

VLSI Implementation of Daubechies Wavelet Filter for Image Compression IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 7, Issue 6, Ver. I (Nov.-Dec. 2017), PP 13-17 e-issn: 2319 4200, p-issn No. : 2319 4197 www.iosrjournals.org VLSI Implementation of Daubechies

More information

Fault Tolerant Parallel Filters Based On Bch Codes

Fault Tolerant Parallel Filters Based On Bch Codes RESEARCH ARTICLE OPEN ACCESS Fault Tolerant Parallel Filters Based On Bch Codes K.Mohana Krishna 1, Mrs.A.Maria Jossy 2 1 Student, M-TECH(VLSI Design) SRM UniversityChennai, India 2 Assistant Professor

More information

An Integrated ECC and BISR Scheme for Error Correction in Memory

An Integrated ECC and BISR Scheme for Error Correction in Memory An Integrated ECC and BISR Scheme for Error Correction in Memory Shabana P B 1, Anu C Kunjachan 2, Swetha Krishnan 3 1 PG Student [VLSI], Dept. of ECE, Viswajyothy College Of Engineering & Technology,

More information

IJSER. Real Time Object Visual Inspection Based On Template Matching Using FPGA

IJSER. Real Time Object Visual Inspection Based On Template Matching Using FPGA International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 823 Real Time Object Visual Inspection Based On Template Matching Using FPGA GURURAJ.BANAKAR Electronics & Communications

More information

Software Testing. 1. Testing is the process of demonstrating that errors are not present.

Software Testing. 1. Testing is the process of demonstrating that errors are not present. What is Testing? Software Testing Many people understand many definitions of testing :. Testing is the process of demonstrating that errors are not present.. The purpose of testing is to show that a program

More information

Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker

Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker version: 15 January 2013 Source file: arch110fall12.tex page 2: Handout 1, Course specification.

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

Comparative Analysis of DMC and PMC on FPGA

Comparative Analysis of DMC and PMC on FPGA Comparative Analysis of DMC and PMC on FPGA Gnanajyothi R 1, Mr Ramana Reddy K V 2, Dr. Siva Yellampalli 3 1 Student, Mtech13, UTL VTU regional center, Bengaluru. 2 Assistant professor, UTL VTU regional

More information

Implementation of Double Precision Floating Point Multiplier Using Wallace Tree Multiplier

Implementation of Double Precision Floating Point Multiplier Using Wallace Tree Multiplier Implementation of Double Precision Floating Point Multiplier Using Wallace Tree Multiplier Y. Ramya sri 1, V B K L Aruna 2 P.G. Student, Department of Electronics Engineering, V.R Siddhartha Engineering

More information

Comparative Performance Analysis of Block and Convolution Codes

Comparative Performance Analysis of Block and Convolution Codes Comparative Performance Analysis of Block and Convolution Codes Manika Pandey M.Tech scholar, ECE DIT University Dehradun Vimal Kant Pandey Assistant Professor/ECE DIT University Dehradun ABSTRACT Error

More information

A Low-Cost Correction Algorithm for Transient Data Errors

A Low-Cost Correction Algorithm for Transient Data Errors A Low-Cost Correction Algorithm for Transient Data Errors Aiguo Li, Bingrong Hong School of Computer Science and Technology Harbin Institute of Technology, Harbin 150001, China liaiguo@hit.edu.cn Introduction

More information

PRIYANKA DAYAL 11/1 Shastari Nagar, Nakodar Road, Jalandhar, India.

PRIYANKA DAYAL 11/1 Shastari Nagar, Nakodar Road, Jalandhar, India. PRIYANKA DAYAL 11/1 Shastari Nagar, Nakodar Road, Jalandhar, India. CELL 9465623550 E-MAIL priyanka23dayal@gmail.com, priyanka_dayal@ymail.com PROFILE Self-motivated when succeed, Optimistic, able to work

More information

A Study on Transmission System for Realistic Media Effect Representation

A Study on Transmission System for Realistic Media Effect Representation Indian Journal of Science and Technology, Vol 8(S5), 28 32, March 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS5/61461 A Study on Transmission System for Realistic

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

PART III. Data Link Layer MGH T MGH C I 204

PART III. Data Link Layer MGH T MGH C I 204 PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control

More information

Implementation of low power wireless sensor node with fault tolerance mechanism

Implementation of low power wireless sensor node with fault tolerance mechanism Implementation of low power wireless sensor node with fault tolerance mechanism R.Divyasharon #1, Dr.D.Sridharan #2 #1 Department of ECE, Anna University CEG, Chennai-25, India #2 Department of ECE, Anna

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Module 7 VIDEO CODING AND MOTION ESTIMATION

Module 7 VIDEO CODING AND MOTION ESTIMATION Module 7 VIDEO CODING AND MOTION ESTIMATION Lesson 20 Basic Building Blocks & Temporal Redundancy Instructional Objectives At the end of this lesson, the students should be able to: 1. Name at least five

More information

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT

More information

Department of Computer Science and Engineering Khulna University of Engineering & Technology Khulna , Bangladesh. Course Plan/Profile

Department of Computer Science and Engineering Khulna University of Engineering & Technology Khulna , Bangladesh. Course Plan/Profile Department of Computer Science and Engineering Khulna University of Engineering & Technology Khulna - 9203, Bangladesh Course Plan/Profile 1. Course No.: CSE 1201 Contact Hours:3/week 2. Course Title:

More information

FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2)

FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2) FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2) 1* EL HABTI EL IDRISSI ANAS, 1, 2 EL GOURI RACHID, 3 AHMED LICHIOUI, 1 HLOU LAAMARI

More information

DLD VIDYA SAGAR P. potharajuvidyasagar.wordpress.com. Vignana Bharathi Institute of Technology UNIT 3 DLD P VIDYA SAGAR

DLD VIDYA SAGAR P. potharajuvidyasagar.wordpress.com. Vignana Bharathi Institute of Technology UNIT 3 DLD P VIDYA SAGAR DLD UNIT III Combinational Circuits (CC), Analysis procedure, Design Procedure, Combinational circuit for different code converters and other problems, Binary Adder- Subtractor, Decimal Adder, Binary Multiplier,

More information

DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX

DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX ENDREDDY PRAVEENA 1 M.T.ech Scholar ( VLSID), Universal College Of Engineering & Technology, Guntur, A.P M. VENKATA SREERAJ 2 Associate

More information

EE 387 course information

EE 387 course information EE 387 course information EE 387, Notes 1, Handout #2 Instructor: John Gill, Packard 266 Textbook: Algebraic Codes for Data Transmission by Richard Blahut Weekly homework, including occasional programming

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture

Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture International Journal of Computer Trends and Technology (IJCTT) volume 5 number 5 Nov 2013 Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture

More information

/$ IEEE

/$ IEEE IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 56, NO. 1, JANUARY 2009 81 Bit-Level Extrinsic Information Exchange Method for Double-Binary Turbo Codes Ji-Hoon Kim, Student Member,

More information

Programming in C++ Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Programming in C++ Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Programming in C++ Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Programs with IO and Loop We will now discuss the module 2,

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

2 Asst Prof, Kottam College of Engineering, Chinnatekur, Kurnool, AP-INDIA,

2 Asst Prof, Kottam College of Engineering, Chinnatekur, Kurnool, AP-INDIA, www.semargroups.org ISSN 2319-8885 Vol.02,Issue.06, July-2013, Pages:413-418 A H/W Efficient 64-Bit Parallel CRC for High Speed Data Transactions P.ABDUL RASOOL 1, N.MOHAN RAJU 2 1 Research Scholar, Kottam

More information

Binary Adders: Half Adders and Full Adders

Binary Adders: Half Adders and Full Adders Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order

More information

It is well understood that the minimum number of check bits required for single bit error correction is specified by the relationship: D + P P

It is well understood that the minimum number of check bits required for single bit error correction is specified by the relationship: D + P P October 2012 Reference Design RD1025 Introduction This reference design implements an Error Correction Code (ECC) module for the LatticeEC and LatticeSC FPGA families that can be applied to increase memory

More information

7 th Grade HONORS Year at a Glance

7 th Grade HONORS Year at a Glance These skills will be incorporated into at least 75% of the test questions in reporting categories 1 5 and will be identified along with content standards. 7.13A identify and apply mathematics to everyday

More information

York Public Schools Subject Area: Mathematics Course: 6 th Grade Math NUMBER OF DAYS TAUGHT DATE

York Public Schools Subject Area: Mathematics Course: 6 th Grade Math NUMBER OF DAYS TAUGHT DATE 6.1.1.d 6.EE.A.1 Represent large numbers using exponential notation (i.e.. 10x10x10x10x10) (Review PV chart first) Write evaluate numerical expressions involving whole number exponents 5 days August, Lesson

More information

Code Design as an Optimization Problem: from Mixed Integer Programming to an Improved High Performance Randomized GRASP like Algorithm

Code Design as an Optimization Problem: from Mixed Integer Programming to an Improved High Performance Randomized GRASP like Algorithm 17 th European Symposium on Computer Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Code Design as an Optimization Problem: from Mixed Integer

More information

Algorithm for a robust Message Authentication

Algorithm for a robust Message Authentication Transaction on IoT and Cloud Computing 1(1) 13-19 2013 Algorithm for a robust Message Authentication Natasa Zivic University of Siegen, Hoelderlinstrasse 3, 57076 Siegen, Germany Abstract Message Authentication

More information

Mobile Application with Optical Character Recognition Using Neural Network

Mobile Application with Optical Character Recognition Using Neural Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

Copyright Detection System for Videos Using TIRI-DCT Algorithm

Copyright Detection System for Videos Using TIRI-DCT Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5391-5396, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: March 18, 2012 Accepted: June 15, 2012 Published:

More information

[Singh*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Singh*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMAGE COMPRESSION WITH TILING USING HYBRID KEKRE AND HAAR WAVELET TRANSFORMS Er. Jagdeep Singh*, Er. Parminder Singh M.Tech student,

More information

Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.

Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces. Quiz Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.) What are the two subspaces associated with a matrix? Describe

More information

Exploiting Unused Spare Columns to Improve Memory ECC

Exploiting Unused Spare Columns to Improve Memory ECC 2009 27th IEEE VLSI Test Symposium Exploiting Unused Spare Columns to Improve Memory ECC Rudrajit Datta and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer Engineering

More information

Performance Optimization of HVD: An Error Detection and Correction Code

Performance Optimization of HVD: An Error Detection and Correction Code Abstract Research Journal of Engineering Sciences ISSN 2278 9472 Performance Optimization of HVD: An Error Detection and Correction Code Fadnavis Shubham Department of Electronics and Communication, Acropolis

More information

IMPLEMENTATION OF LOW-COMPLEXITY REDUNDANT MULTIPLIER ARCHITECTURE FOR FINITE FIELD

IMPLEMENTATION OF LOW-COMPLEXITY REDUNDANT MULTIPLIER ARCHITECTURE FOR FINITE FIELD IMPLEMENTATION OF LOW-COMPLEXITY REDUNDANT MULTIPLIER ARCHITECTURE FOR FINITE FIELD JyothiLeonoreDake 1,Sudheer Kumar Terlapu 2 and K. Lakshmi Divya 3 1 M.Tech-VLSID,ECE Department, SVECW (Autonomous),Bhimavaram,

More information

A Hybrid Approach for Content Based Image Retrieval System

A Hybrid Approach for Content Based Image Retrieval System IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 5 (Jul. - Aug. 2013), PP 56-61 A Hybrid Approach for Content Based Image Retrieval System Mrs. Madhavi

More information

Diversity Coloring for Distributed Storage in Mobile Networks

Diversity Coloring for Distributed Storage in Mobile Networks Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring

More information

ICMIEE-PI Real-Time Monitoring and Controlling of Remote Electrical Device Using Microcontroller and Android Smart Phone via Internet

ICMIEE-PI Real-Time Monitoring and Controlling of Remote Electrical Device Using Microcontroller and Android Smart Phone via Internet International Conference on Mechanical, Industrial and Energy Engineering 2014 26-27 December, 2014, Khulna, BANGLADESH ICMIEE-PI-140166 Real-Time Monitoring and Controlling of Remote Electrical Device

More information

Mobile Positioning System Based on the Wireless Sensor Network in Buildings

Mobile Positioning System Based on the Wireless Sensor Network in Buildings Communications and Network, 2009, 1, 96-100 doi:10.4236/cn.2009.12015 Published Online November 2009 (http://www.scirp.org/journal/cn). Mobile Positioning System Based on the Wireless Sensor Network in

More information

Defect Tolerance in VLSI Circuits

Defect Tolerance in VLSI Circuits Defect Tolerance in VLSI Circuits Prof. Naga Kandasamy We will consider the following redundancy techniques to tolerate defects in VLSI circuits. Duplication with complementary logic (physical redundancy).

More information

Software Implementation of Break-Up Algorithm for Logic Minimization

Software Implementation of Break-Up Algorithm for Logic Minimization vol. 2, no. 6. 2, pp. 141-145, 2017 DOI: https://doi.org/10.24999/ijoaem/02060034 Software Implementation of Break-Up Algorithm for Logic Minimization Koustuvmoni Bharadwaj and Sahadev Roy Abstract In

More information

CDS Computing for Scientists. Final Exam Review. Final Exam on December 17, 2013

CDS Computing for Scientists. Final Exam Review. Final Exam on December 17, 2013 CDS 130-001 Computing for Scientists Final Exam Review Final Exam on December 17, 2013 1. Review Sheet 2. Sample Final Exam CDS 130-001 Computing for Scientists Final Exam - Review Sheet The following

More information

VOICE CONTROLLED WHEEL CHAIR USING ARDUINO

VOICE CONTROLLED WHEEL CHAIR USING ARDUINO VOICE CONTROLLED WHEEL CHAIR USING ARDUINO Kharka Bahadur Rai 1, Jeetendra Thakur 2, Nirmal Rai 3 1,2 Student, 3 Asst. Professor, Department of Electronics and Communication Engineering, Sikkim Manipal

More information

Design of Flash Controller for Single Level Cell NAND Flash Memory

Design of Flash Controller for Single Level Cell NAND Flash Memory Design of Flash Controller for Single Level Cell NAND Flash Memory Ashwin Bijoor 1, Sudharshana 2 P.G Student, Department of Electronics and Communication, NMAMIT, Nitte, Karnataka, India 1 Assistant Professor,

More information